Skip to main content

CVE-1999-0330: Linux bdash game has a buffer overflow that allows local users to gain root access.

High
VulnerabilityCVE-1999-0330cve-1999-0330buffer overflow
Published: Sun Mar 01 1998 (03/01/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: linux
Product: linux_kernel

Description

Linux bdash game has a buffer overflow that allows local users to gain root access.

AI-Powered Analysis

AILast updated: 06/30/2025, 05:11:44 UTC

Technical Analysis

CVE-1999-0330 is a high-severity vulnerability affecting the Linux bdash game, specifically present in Linux kernel version 2.6.20.1. The vulnerability is a buffer overflow that allows local users to escalate their privileges to root. Buffer overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially overwriting adjacent memory and enabling arbitrary code execution. In this case, the overflow in the bdash game can be exploited by a local attacker to execute code with root privileges, effectively bypassing normal user restrictions. The vulnerability requires local access (AV:L) and low attack complexity (AC:L), but no authentication is needed (Au:N). The impact on confidentiality, integrity, and availability is critical, as the attacker gains full control over the system. Although the vulnerability dates back to 1998 and affects an older kernel version, it remains relevant for legacy systems or environments running unpatched or outdated Linux kernels. No patch is currently available, and no known exploits have been reported in the wild, which may limit immediate risk but does not eliminate the threat for vulnerable systems.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Linux systems running the affected kernel version are still in use, particularly in industrial control systems, research environments, or specialized embedded devices. Successful exploitation would allow an attacker with local access to gain root privileges, potentially leading to full system compromise, data theft, unauthorized modifications, or disruption of services. This could result in breaches of sensitive personal data protected under GDPR, operational downtime, and damage to organizational reputation. The requirement for local access limits remote exploitation, but insider threats or attackers who gain initial footholds through other means could leverage this vulnerability to escalate privileges. Organizations relying on outdated Linux kernels should be particularly cautious, as modern distributions have long since patched or mitigated this issue.

Mitigation Recommendations

Given the absence of an official patch, European organizations should prioritize upgrading affected systems to supported Linux kernel versions that have addressed this vulnerability. For legacy systems where upgrades are not immediately feasible, organizations should restrict local access strictly, employing strong user account controls, monitoring, and auditing to detect unauthorized activity. Implementing mandatory access controls (e.g., SELinux or AppArmor) can help contain the impact of potential exploits. Additionally, disabling or removing the bdash game and any unnecessary software reduces the attack surface. Employing intrusion detection systems to monitor for suspicious local privilege escalation attempts and enforcing strict physical security controls to prevent unauthorized local access are also recommended. Regular security assessments and system hardening practices will further mitigate risks associated with this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de91b

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 5:11:44 AM

Last updated: 7/27/2025, 1:59:56 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats